Results 261 to 270 of about 10,750 (298)
Some of the next articles are maybe not open access.

A mutual-healing key distribution scheme in wireless sensor networks

Journal of Network and Computer Applications, 2011
How to establish secure session keys is one of the central tasks for wireless sensor network communications. General key distribution schemes for traditional computer networks could not be directly shifted to wireless sensor network environments as broadcast messages may be lost due to sensor network internal factors or external attacks.
Tian, Biming   +3 more
openaire   +2 more sources

A Novel Key Distribution Algorithm in Wireless Sensor Network

2014 Sixth International Conference on Measuring Technology and Mechatronics Automation, 2014
This paper studies the E-G key pre-distribution algorithm principle, and a new key distribution algorithm based on the Blom key pre-distribution model is proposed. The nodes is deployed in a hexagonal area. Each cluster uses preshared key to establish key pair, Blom key pre-distribution model is used in the establishment of key pair among clusters. The
openaire   +1 more source

Secure Secret Key Distribution and Storage in Wireless Sensor Networks

2010 10th IEEE International Conference on Computer and Information Technology, 2010
Security in Wireless Sensor Networks (WSNs) is commonly bootstrapped by cryptographic key distribution among nodes. In this scenario, one of the greatest research challenges is to ensure secure keys storage by sensors due to their constrained resources and major exposure to tampering attempts.
Juliano F. Kazienko   +1 more
openaire   +1 more source

A Novel Key Pre-distribution Scheme in Wireless Sensor Networks

2014 Tenth International Conference on Computational Intelligence and Security, 2014
Key management for wireless sensor networks has been a challenging research topic since stringent resource constraints make the key pre-distribution schemes difficult to implement. This paper proposes a novel key pre-distribution method based on trivariate symmetry polynomial and hash function.
Zhongyuan Qin   +3 more
openaire   +1 more source

Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks

2006 IEEE International Conference on Communications, 2006
Secure communications between large number of sensor nodes that are randomly scattered over a hostile territory, necessitate efficient key distribution schemes. However, due to limited resources at sensor nodes such schemes cannot be based on post deployment computations.
Camtepe, Seyit   +2 more
openaire   +2 more sources

A Combinatorial Approach for Key-Distribution in Wireless Sensor Networks

IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference, 2008
Sensor nodes are usually deployed in adversarial environments in which they are subject to compromise and revelation of critical information rendering the entire network useless. Therefore, secure communication of wireless sensor networks (WSNs) necessitates utilization of efficient key distribution schemes. Over the past few years, several works using
H. Shafiei   +3 more
openaire   +1 more source

Key pre-distribution in wireless sensor networks using multivariate polynomials

2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005., 2005
Key agreement in sensor networks is a dif- ficult problem because of resource constraints of the sensors. The classical approaches used in general networks are impractical in sensor networks. Hence, several key pre-distribution schemes are proposed. In this paper, we propose a hypercube multivariate scheme (HMS) that is a threshold-based scheme. In the
F. Delgosha, F. Fekri
openaire   +1 more source

An improved distributed key revocation scheme in wireless sensor networks

2008 11th IEEE International Conference on Communication Technology, 2008
A distributed reliable key revocation scheme is proposed in this paper according to randomness of the deployment of sensor nodes. This scheme derives the concept of appealing members who are responsible for userspsila revocation operations as the topology varies by using secret sharing techniques and modified Blompsilas symmetric key establishment ...
null Jun Zhou, null Mingxing He
openaire   +1 more source

Secure Network Discovery in Wireless Sensor Networks Using Combinatorial Key Pre-distribution

2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications, 2011
Many sensor network protocols utilize the existence of disjoint paths (e.g., perfectly secure message transmission or multi-path key establishment), but do not address how a node actually determines these paths in the presence of an adversary. In this paper we investigate what assumptions are necessary to gather information about the local network ...
Kevin Henry, Douglas R. Stinson
openaire   +1 more source

An Improved Distributed Key Management Scheme in Wireless Sensor Networks

2009
A distributed key management scheme and the robust continuity of group key establishment are realized in this paper. This scheme derives the concept of seed members who are responsible for the management of users' joining and revocation operations by using secret sharing techniques and Modified Blom's symmetric key establishment mechanism.
Jun Zhou, Mingxing He
openaire   +1 more source

Home - About - Disclaimer - Privacy